General

  • Target

    6be5db63a57e72ad2e7e392515263028_JaffaCakes118

  • Size

    250KB

  • Sample

    240523-xayzzacb79

  • MD5

    6be5db63a57e72ad2e7e392515263028

  • SHA1

    726cd1e883e6f5fdd88d078b0307508c5a92c5e6

  • SHA256

    d6f8a80f7e5ef5656b672f0cd33a92a3f0a8535eb7ef44536624f9752d5fe3e7

  • SHA512

    c5b135169bb7a9daabe2e6fe911773afb5ad9129b44827a5f7063fa980d94de4dd8279fa5a5d2361764df87da8fc2a6ff63abc897253591d6b2f228b072978ee

  • SSDEEP

    6144:H7M7dvnzkoajd9y7JJw+KJJ8Vs6QVNBrVCebY/h7Nd/WVd:oZvoeJJw+VCNBrsHNJUd

Malware Config

Targets

    • Target

      6be5db63a57e72ad2e7e392515263028_JaffaCakes118

    • Size

      250KB

    • MD5

      6be5db63a57e72ad2e7e392515263028

    • SHA1

      726cd1e883e6f5fdd88d078b0307508c5a92c5e6

    • SHA256

      d6f8a80f7e5ef5656b672f0cd33a92a3f0a8535eb7ef44536624f9752d5fe3e7

    • SHA512

      c5b135169bb7a9daabe2e6fe911773afb5ad9129b44827a5f7063fa980d94de4dd8279fa5a5d2361764df87da8fc2a6ff63abc897253591d6b2f228b072978ee

    • SSDEEP

      6144:H7M7dvnzkoajd9y7JJw+KJJ8Vs6QVNBrVCebY/h7Nd/WVd:oZvoeJJw+VCNBrsHNJUd

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Tries to add a device administrator.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks